!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

902 Members
Declaratively manage your switching, routing, wireless, tunneling and more.263 Servers

Load older messages


SenderMessageTime
23 Jul 2025
@xv3121:matrix.org@xv3121:matrix.orgRedacted or Malformed Event17:29:31
@k900:0upti.meK900This is definitely the wrong room for this17:30:23
@xv3121:matrix.org@xv3121:matrix.orgRedacted or Malformed Event17:31:56
@rajil:rajils.com@rajil:rajils.com left the room.22:41:39
24 Jul 2025
@xv3121:matrix.org@xv3121:matrix.org left the room.09:32:08
25 Jul 2025
@vuks:matrix.orgVuks joined the room.18:03:00
26 Jul 2025
@elvishjerricco:matrix.orgElvishJerriccoHas anyone ever done tailscale "sidecars" with nixos? Wondering what's the best way to set stuff like that up with just nixos and not the docker stuff the rest of the world uses.07:11:01
@elvishjerricco:matrix.orgElvishJerricco the point being that one machine can have a variety of services each with its own e.g. https://jellyfin.my-net.ts.net 07:11:36
@k900:0upti.meK900I don't do it with sidecars07:16:10
@k900:0upti.meK900 I just added a bunch of extra records to Headscale config 07:16:21
@k900:0upti.meK900And then route by host at nginx level07:16:31
@elvishjerricco:matrix.orgElvishJerriccohm yea I haven't been brave enough to do headscale07:16:51
@k900:0upti.meK900 So I just have "jellyfin.ts.0upti.me A 100.64.0.5" or whatever 07:17:15
@k900:0upti.meK900 I assume the normal control plane also has a setting for that? 07:17:32
@elvishjerricco:matrix.orgElvishJerriccoif it does that's news to me07:17:45
@k900:0upti.meK900 Would be weird if it's in the API but not in the UI 07:18:13
@k900:0upti.meK900 I haven't actually used the normal control plane in a bit 07:18:14
@elvishjerricco:matrix.orgElvishJerriccoyea I don't see a way to add another dns record for a node07:20:24
@elvishjerricco:matrix.orgElvishJerriccoplus I don't see how tailscale would be meant to do its cert stuff that way anyway. You can't get a wildcard cert07:22:49
@elvishjerricco:matrix.orgElvishJerricco* plus I don't see how tailscale would be meant to do its cert stuff that way anyway. You can't get a wildcard cert (I think)07:23:04
@zhaofeng:zhaofeng.liZhaofeng Liyou do need to get your own certs and do your own DNS07:29:19
@elvishjerricco:matrix.orgElvishJerriccoright well the convenient thing about tailscale is not having to do that :P07:29:43
@zhaofeng:zhaofeng.liZhaofeng Liyeah, but it's actually not bad with automation (dnscontrol/octodns)07:30:38
@elvishjerricco:matrix.orgElvishJerriccoyea I mean I know how to do stuff like that07:31:21
@elvishjerricco:matrix.orgElvishJerriccobut it's also nice to use the private dns records of your tailnet rather than public dns records07:33:03
@elvishjerricco:matrix.orgElvishJerriccoand I don't think there's a way to distribute custom dns over tailscale07:34:01
@elvishjerricco:matrix.orgElvishJerricco(I'm also bad at networking and might have this all wrong)07:34:43
@zhaofeng:zhaofeng.liZhaofeng Lithere is, you can force a resolver across all your devices07:34:49
@zhaofeng:zhaofeng.liZhaofeng Li(I force it to controld because I'm lazy, but you can point it at your unbound for example)07:35:23
@elvishjerricco:matrix.orgElvishJerriccooh I see. You can add a nameserver in the control plane ui, and I could just point that at one of my tailscale machines and have that distribute custom records for a domain I own, then get certs manually for that domain with LetsEncrypt07:37:35

Show newer messages


Back to Room ListRoom Version: 6